Roundcube on alert two exploited vulnerabilities force already to park and expose tens of thousands of facilities

Published 4 min de lectura 195 reading

Roundcube Webmail, the web-based mail client who has been with millions of servers for years and who since 2008 has been integrated as a default interface in cPanel, was again placed at the centre of attention for reasons that any system manager should take seriously. The United States Infrastructure and Cybersecurity Agency (CISA) recently added two Roundcube failures to its catalogue of nature-exploited vulnerabilities and gave strict instructions for federal agencies to apply patches urgently.

The first noted failure allows remote code execution and is recorded as CVE-2025-49113. It was patched by Roundcube's officials, but researchers and monitoring organizations detected exploitation shortly after the correction was published, which motivated public alerts on tens of thousands of exposed facilities. The second problem, CVE-2025-68461, is a vulnerability of cross-site scribing (XSS) that abuses the animate label in SVG documents and that also has patch available from the versions that Roundcube published to correct it.

Roundcube on alert two exploited vulnerabilities force already to park and expose tens of thousands of facilities
Image generated with IA.

To contextualize the magnitude of the risk: search engines oriented to Internet-connected devices such as Shodan show tens of thousands of Roundcube instances accessible from the public network - a figure that indicates the enormous potential scope of any critical vulnerability in this software. See the public search for Shodan related to Roundcube Here..

CISA formalized the concern in an official alert in which it included both failures in its public communication and added the entries to the A catalogue of known and exploited vulnerabilities (KEV), a list the agency uses to prioritize defensive actions in the public sector. In addition, CISA recalled that there are other historical vulnerabilities in Roundcube that have been exploited by malicious actors, and that is why it included this family of failures in its continuous follow-up.

The federal government's response was rapid in terms of demand: through the binding operational directive known as BOD 22-01 Federal civil agencies were ordered to complete the necessary mitigation within three weeks. That hurry is not casual: vulnerabilities in web mail interfaces are attractive to criminals and state-sponsored groups because they offer relatively direct access to conversations and credentials, and because many facilities remain exposed for long periods.

Roundcube officials published corrections that organizations must adopt as soon as possible; the corrective versions for the supported branches are available on the official project channels and in the launch repositories. If you manage Roundcube servers, it is essential to update to the versions that include patches, review records for possible unauthorized access and minimize public exposure of the interface where possible. The project launch repository in GitHub is available for access to publications and official versions: Roundcube - Releases.

This is not the first time Roundcube has served as a vector for sophisticated campaigns. Historically, actors with political or criminal motivations have exploited failures of this software to spy on administrations and organizations. This pattern - public failure, patch and operation in a few days - highlights a simple but painful reality: the window between the publication of a patch and its effective deployment remains the main weakness in the safety of many infrastructure.

Roundcube on alert two exploited vulnerabilities force already to park and expose tens of thousands of facilities
Image generated with IA.

From a practical point of view, updating as soon as possible is the essential measure. In addition, it is appropriate to tighten the exposure of web mail interfaces through access rules, strong authentication, log monitoring and commitment indicators analysis. It is also recommended that security officials consult official intelligence sources and catalogues, such as the CISA list mentioned above, to prioritize actions based on the real risk and presence of the software in their environment.

The lesson that this episode leaves is clear: even widely deployed and long-standing tools can become a systemic risk if the updates are not applied quickly and if the telemetry on their exposure is not integrated into the security processes. Keeping the software up to date, reducing the exposed surface and actively monitoring environments are practical that together make the difference between a protected patch and a patch that comes too late.

Recommended sources and readings: the entry of CISA on the inclusion of these vulnerabilities in its catalogue Here., technical details at the National Vulnerability Database for CVE-2025-49113 and CVE-2025-68461, the public search for Roundcube's Shodan and the official Roundcube launch repository in GitHub.

Coverage

Related

More news on the same subject.